Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

If the true password hash is never passed to the server over the network, how can a malicious user “crack” my password when they only have the hashed response?

0
0 Posted

If the true password hash is never passed to the server over the network, how can a malicious user “crack” my password when they only have the hashed response?

0
0

In the malicious telnet server scenario, the telnet server would maintain a copy of both the server-issued challenge and the response received from the client. A brute force password-cracking program could hash the results of all the possible password hashes, derived above, with the server issued challenge. The resulting value is compared against the response hash obtained by the malicious person. If the response hash (captured from the client) matches the hash value derived from the cracking program, the malicious user would know the password used to produce the initial hash is the user’s password. Because the malicious person controls the telnet server in this scenario, he could adjust the mechanism used to generate the tokens. Instead of sending the client a randomly generated token, a specially created telnet server application could respond with a specific known token that would aid the malicious user in performing offline brute-force password “cracking” efforts.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123